Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Java Programming

FinalProject.pdf

Final Project – Credit card numbers and the case of Mobius Duck

In this project, you are assisting an investigation. The investigator asked you to help him determine the
validity of credit card numbers located in a case of Mobius Duck, case number 20150510-001.

Your task is to:

– Read the data listed below “Data to Evaluate” from a file.

– Evaluate each number to see if they are representing a possible credit card number.

– Validate each credit card number to see if they are a valid number.

– Store the valid numbers and invalid numbers in a separate array.

– Write the contents of validated credit card number array into a file called “valid_cards.txt”.

– Write the invalid credit card number array to a file called “invalid_numbers.txt”.

– Make sure to include the issuer for each group of credit card numbers identified.

– Your application should work with any number of credit card entries.

Turn in:

– Source code ( .java ) files of all classes and driver class.

– Completed UML for application classes.

– Flow chart for every method that contains beyond sequential logic flow.

– Generated javadocs structure.

– Input and output files

Grading:

– Naming standard followed for project files – 2%

– Input and output files – 2%

– Javadoc structure – 5%

– Project compiled without error – 91%

– Proper use of internal comments, docstrings, and tags – 5%

– Self documenting field, identifier, method, static, final, and class identifiers – 5%

– Properly validated input and output files – 5%

– Properly used arrays to store data – 5%

– Correct output calculated by the Luhn algorithm and card number issuer identified – 71%

Extra Credit:

– Implement the full Issuer IIN Range instead of the simplified list.

How to validate Credit Card Numbers?
Most credit card number can be validated using the Luhn algorithm, which is more or a less a glorified Modulo
10 formula!

The Luhn Formula:

• Drop the last digit from the number. The last digit is what we want to check against
• Reverse the numbers
• Multiply the digits in odd positions (1, 3, 5, etc.) by 2 and subtract 9 to all any result higher than 9
• Add all the numbers together
• The check digit (the last number of the card) is the amount that you would need to add to get a multiple

of 10 (Modulo 10)

Luhn Example:

Steps Total
Original Number: 4 5 5 6 7 3 7 5 8 6 8 9 9 8 5 5
Drop the last digit: 4 5 5 6 7 3 7 5 8 6 8 9 9 8 5
Reverse the digits: 5 8 9 9 8 6 8 5 7 3 7 6 5 5 4
Multiple odd digits by 2: 10 8 18 9 16 6 16 5 14 3 14 6 10 5 8
Add digits from line above 1 8 9 9 7 6 7 5 5 3 5 6 1 5 8
Add all numbers: 1 8 9 9 7 6 7 5 5 3 5 6 1 5 8 85
Mod 10: (85 + X) modulo 10 = 0 , thus X=5 (last digit of card)

List of credit card number formats
Credit Card Issuer Starts With ( IIN Range ) Length ( Number of digits )

American Express 34, 37 15
Diners Club – Carte Blanche 300, 301, 302, 303, 304, 305 14
Diners Club – International 36 14
Diners Club – USA & Canada 54 16

Discover
6011, 622126 to 622925, 644, 645, 646,
647, 648, 649, 65

16

InstaPayment 637, 638, 639 16
JCB 3528 to 3589 16
Laser 6304, 6706, 6771, 6709 16-19

Maestro
5018, 5020, 5038, 5893, 6304, 6759, 6761,
6762, 6763

16-19

MasterCard 51, 52, 53, 54, 55 16-19
Visa 4 13-16
Visa Electron 4026, 417500, 4508, 4844, 4913, 4917 16

Data to Evaluate
3158539628375348
3337465828248404
3112804683572030
3112804683572033
5435528978467581
6706465468107999
6304362971054667
6706169762827894
6706169762827892
4844104341377697
4913405490886727
4844885754351829
4844885754351822
6371473570875275
6381475006869978
6389057917814806
347100734345549
347100734345543
6011162533805000
6011621663574413
6011824617460743
6011824617460745
6389057917814802
4539318768050385
36880982786892
36845793345501
36661154562232
36661154562234
5893329089846994
6761680165952016
6763100400984029
6763100400984022
5127043299122389
5330838017737340
5429168755154025
5429168755154023
375354034606481
379570632133224
4485521241443135
4532916206508075
4532916206508076
5590976687287124
5540641137519895
5540641137519892
30522070708059
30066552673241
30365487186802
30365487186801

Simplified Issuer Codes for Final Project:

VISA:
45
44
MasterCard:
51
53
American Express (AMEX):
37
34
Discover:
60
JCB:
31
33
Diners Club – North America:
54
55
Diners Club – Carte Blanche:
30
Diners Club – International:
36
Maestro:
58
LASER:
67
Visa Electron:
48
49
InstaPayment:
63

  • Final Project – Credit card numbers and the case of Mobius Duck
  • How to validate Credit Card Numbers?
    • The Luhn Formula:
    • Luhn Example:
  • List of credit card number formats
  • Simplified Issuer Codes for Final Project:

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Computer Science 2 Assignments

Operational Excellence Week 2 Assignment Information Systems for Business and Beyond Questions: · Chapter 3 – study questions 1-8, Exercise 2, 4 & 5 Information Technology and Organizational Learning Assignment: Chapter 3 – Complete the two essay assignments noted below:  · Review the strategic integration section.  Note what strategic integration is and how

Discussion 3: generative adversarial nets

  Generative adversarial nets are mentioned in 2014 by Ian Goodfellow et al.  Why is generative adversarial network a key turning point in the history of generative modeling? Why is the field of image generation important? 

Week 3 – Linear Regression & Business Decision Making

attached file.  An asset management company must replace the manager of its two signature mutual funds, who is about to retire. Two candidates have been short-listed. The management team is divided and cannot decide which of the two candidates would make the better mutual fund manager. The retiring manager presents

data science

Final Exam Due Saturday 11:59 pm (Week 15) You cannot use any of the datasets in our assignments, class notes, and your own midterm project. If you are using the same one, you will receive 0 for your final project. 1. Question Formulation (5 points): You need to devise a

Letter of Recommendations

Hi  Attached is the sample of Letter of recommendation  Please write about it accordingly  1. Write about author :AUTHOR WILL BE professor David Kimble I will give links about his Biography write accordingly or you can use your own search engines about him to write it. 2 . How the

Letter of Recommendations

Hi  Attached is the sample of Letter of recommendation  Please write about it accordingly  1. Write about author :AUTHOR WILL BE professor David Kimble I will give links about his Biography write accordingly or you can use your own search engines about him to write it. 2 . How the

data science

Final Exam Due Saturday 11:59 pm (Week 15) You cannot use any of the datasets in our assignments, class notes, and your own midterm project. If you are using the same one, you will receive 0 for your final project. 1. Question Formulation (5 points): You need to devise a

IT 202

5/15/24, 10:59 AM Assignment Information 1/3 IT 202 Project One Milestone Guidelines and Rubric Overview For the purposes of this assignment, imagine that you are a systems architect at a medium-sized publishing company with 130 employees. The company primarily publishes books, both in print and online. It also produces other

Assessments

Perimeter defense techniques Evaluate the types of assessments, select one that you might use, and explain why it is important. Of the top eight areas to research when conducting an assessment, select no less than three and explain how one should approach the research and why it should be approached

project ppt presentation

Project 3 – Ensemble Methods and Unsupervised Learning In this project you will explore some techniques in unsupervised learning as well as ensemble methods. It is important to realize that understanding an algorithm or technique requires understanding how it behaves under a variety of circumstances. You will go through the

Week 2 understanding on Python.

PDF for reference purpose other file is requirement Python Installation & Examples Atif Farid Mohammad PhD 1. Open any Browser 2. Go to 3. Click at Download button 4. Go to your Download Folder (In both Windows and Mac) a. In Windows you will have the file: Anaconda3-2022.05-Windows-x86_64.exe b. Double

Computer Science Assignments

Operational Excellence Week 2 Assignment information Systems for Business and Beyond Questions · Chapter 2 – study questions 1-10, Exercise 2      Information Technology and Organizational Learning Questions · Chapter 2 – Note why the IT organizational structure is an important concept to understand.  Also, note the role of

Computer Science IT project assignment

Pg. 01 Project I Project Deadline: Sunday 12/5/2024 @ 23:59 [Total Mark is 14] Introduction to Database IT244 College of Computing and Informatics Project Instructions · You can work on this project as a group (minimum 2 and maximum 3 students). Each group member must submit the project individually with

project ppt presentation

Project 3 – Ensemble Methods and Unsupervised Learning In this project you will explore some techniques in unsupervised learning as well as ensemble methods. It is important to realize that understanding an algorithm or technique requires understanding how it behaves under a variety of circumstances. You will go through the

coding

Assignment 6 Due Saturday 11:59 pm (Week 14) Part 1 (50 points) We will explore the Marvel Network Universe. The dataset which you will find in Blackboard consists of the hero’s networks. For this dataset, you will need to ask yourself 3 questions (i.e which superhero knows more superheroes?) ,

project ppt presentation

Project 3 – Ensemble Methods and Unsupervised Learning In this project you will explore some techniques in unsupervised learning as well as ensemble methods. It is important to realize that understanding an algorithm or technique requires understanding how it behaves under a variety of circumstances. You will go through the

How hackers get info

Identify at least two ways in which hackers gather information about companies. What can companies do to limit this access, specifically to the ways you have identified? Which type of information can be gathered with enumeration? How and why should companies protect themselves against enumeration attempts?